PoC-in-GitHub/2019/CVE-2019-16278.json
2025-03-10 09:31:55 +09:00

439 lines
No EOL
16 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 215200285,
"name": "CVE-2019-16278",
"full_name": "jas502n\/CVE-2019-16278",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-16278",
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2024-08-12T19:53:55Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 69,
"score": 0,
"subscribers_count": 2
},
{
"id": 215258157,
"name": "CVE-2019-16278-PoC",
"full_name": "imjdl\/CVE-2019-16278-PoC",
"owner": {
"login": "imjdl",
"id": 31382943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
"html_url": "https:\/\/github.com\/imjdl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-16278-PoC",
"description": "CVE-2019-16728 Proof of Concept",
"fork": false,
"created_at": "2019-10-15T09:22:36Z",
"updated_at": "2024-08-12T19:53:55Z",
"pushed_at": "2019-10-15T09:28:25Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 215297351,
"name": "CVE-2019-16278",
"full_name": "ianxtianxt\/CVE-2019-16278",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo httpd命令执行",
"fork": false,
"created_at": "2019-10-15T12:47:59Z",
"updated_at": "2024-08-12T19:53:55Z",
"pushed_at": "2020-01-11T07:25:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 217164072,
"name": "Nostromo_Python3",
"full_name": "darkerego\/Nostromo_Python3",
"owner": {
"login": "darkerego",
"id": 8583665,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8583665?v=4",
"html_url": "https:\/\/github.com\/darkerego",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/darkerego\/Nostromo_Python3",
"description": "CVE-2019-16278 Python3 Exploit Code",
"fork": false,
"created_at": "2019-10-23T22:24:18Z",
"updated_at": "2023-09-09T18:40:27Z",
"pushed_at": "2019-10-23T22:26:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 223463242,
"name": "CVE-2019-16278",
"full_name": "AnubisSec\/CVE-2019-16278",
"owner": {
"login": "AnubisSec",
"id": 38790814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38790814?v=4",
"html_url": "https:\/\/github.com\/AnubisSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AnubisSec\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. ",
"fork": false,
"created_at": "2019-11-22T18:35:14Z",
"updated_at": "2024-08-12T19:55:06Z",
"pushed_at": "2019-11-22T18:57:29Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 224208624,
"name": "CVE-2019-16278-Nostromo_1.9.6-RCE",
"full_name": "aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"owner": {
"login": "aN0mad",
"id": 36172640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36172640?v=4",
"html_url": "https:\/\/github.com\/aN0mad",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aN0mad\/CVE-2019-16278-Nostromo_1.9.6-RCE",
"description": "Python script to exploit RCE in Nostromo nhttpd <= 1.9.6.",
"fork": false,
"created_at": "2019-11-26T14:15:44Z",
"updated_at": "2024-09-05T17:01:13Z",
"pushed_at": "2019-11-26T14:26:03Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 231114950,
"name": "cve-2019-16278",
"full_name": "Kr0ff\/cve-2019-16278",
"owner": {
"login": "Kr0ff",
"id": 35173514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35173514?v=4",
"html_url": "https:\/\/github.com\/Kr0ff",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kr0ff\/cve-2019-16278",
"description": "(Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal ",
"fork": false,
"created_at": "2019-12-31T16:06:13Z",
"updated_at": "2020-02-19T19:35:33Z",
"pushed_at": "2019-12-31T16:07:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 231220055,
"name": "CVE-2019-16278",
"full_name": "NHPT\/CVE-2019-16278",
"owner": {
"login": "NHPT",
"id": 42366434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42366434?v=4",
"html_url": "https:\/\/github.com\/NHPT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NHPT\/CVE-2019-16278",
"description": "CVE-2019-16278Nostromo Web服务器的RCE漏洞",
"fork": false,
"created_at": "2020-01-01T13:28:40Z",
"updated_at": "2024-08-12T19:56:11Z",
"pushed_at": "2020-01-01T13:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 251251110,
"name": "cve-2019-16278",
"full_name": "keshiba\/cve-2019-16278",
"owner": {
"login": "keshiba",
"id": 62872563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62872563?v=4",
"html_url": "https:\/\/github.com\/keshiba",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/keshiba\/cve-2019-16278",
"description": "Exploit for the CVE-2019-16278 vulnerability",
"fork": false,
"created_at": "2020-03-30T08:54:06Z",
"updated_at": "2022-06-24T16:41:10Z",
"pushed_at": "2022-06-24T16:41:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploits",
"httpd"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 387298591,
"name": "CVE-2019-16278",
"full_name": "n3rdh4x0r\/CVE-2019-16278",
"owner": {
"login": "n3rdh4x0r",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/n3rdh4x0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n3rdh4x0r\/CVE-2019-16278",
"description": null,
"fork": false,
"created_at": "2021-07-19T00:45:07Z",
"updated_at": "2024-11-18T19:18:27Z",
"pushed_at": "2024-11-18T19:18:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 473589212,
"name": "CVE-2019-16278",
"full_name": "alexander-fernandes\/CVE-2019-16278",
"owner": {
"login": "alexander-fernandes",
"id": 82245105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82245105?v=4",
"html_url": "https:\/\/github.com\/alexander-fernandes",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/alexander-fernandes\/CVE-2019-16278",
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.",
"fork": false,
"created_at": "2022-03-24T12:06:55Z",
"updated_at": "2022-03-24T12:25:16Z",
"pushed_at": "2022-03-24T12:25:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 636450695,
"name": "CVE-2019-16278-Nostromo-1.9.6-RCE",
"full_name": "FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"owner": {
"login": "FredBrave",
"id": 114189847,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
"html_url": "https:\/\/github.com\/FredBrave",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FredBrave\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"description": "This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine.",
"fork": false,
"created_at": "2023-05-04T21:59:23Z",
"updated_at": "2023-05-04T22:07:58Z",
"pushed_at": "2023-05-04T22:07:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 886972763,
"name": "CVE-2019-16278-Nostromo-1.9.6-RCE",
"full_name": "cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"owner": {
"login": "cancela24",
"id": 103641206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103641206?v=4",
"html_url": "https:\/\/github.com\/cancela24",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cancela24\/CVE-2019-16278-Nostromo-1.9.6-RCE",
"description": "This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a reverse shell. For educational and authorized testing use only.",
"fork": false,
"created_at": "2024-11-12T00:13:24Z",
"updated_at": "2024-11-13T18:33:57Z",
"pushed_at": "2024-11-12T00:15:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 931321620,
"name": "CVE-2019-16278_Nostromo-1.9.6---Remote-Code-Execution",
"full_name": "CybermonkX\/CVE-2019-16278_Nostromo-1.9.6---Remote-Code-Execution",
"owner": {
"login": "CybermonkX",
"id": 198016905,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/198016905?v=4",
"html_url": "https:\/\/github.com\/CybermonkX",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CybermonkX\/CVE-2019-16278_Nostromo-1.9.6---Remote-Code-Execution",
"description": "An unauthenticated attacker can force server points to a shell file like \/bin\/sh and execute arbitrary commands due to the failure in verifying the URL which leads to path traversal to any file that exists in the system. Nostromos versions such as 1.9.6 fail to verify this URL ",
"fork": false,
"created_at": "2025-02-12T04:38:30Z",
"updated_at": "2025-02-12T08:49:47Z",
"pushed_at": "2025-02-12T08:49:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]