Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Directory transversal to remote code execution | https://github.com/jas502n/CVE-2019-16278 | POC Details |
| 2 | CVE-2019-16728 Proof of Concept | https://github.com/imjdl/CVE-2019-16278-PoC | POC Details |
| 3 | CVE-2019-16278Nostromo httpd命令执行 | https://github.com/ianxtianxt/CVE-2019-16278 | POC Details |
| 4 | CVE-2019-16278 Python3 Exploit Code | https://github.com/darkerego/Nostromo_Python3 | POC Details |
| 5 | A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Simply takes a host and port that the web server is running on. | https://github.com/AnubisSec/CVE-2019-16278 | POC Details |
| 6 | Python script to exploit RCE in Nostromo nhttpd <= 1.9.6. | https://github.com/theRealFr13nd/CVE-2019-16278-Nostromo_1.9.6-RCE | POC Details |
| 7 | (Nhttpd) Nostromo 1.9.6 RCE due to Directory Traversal | https://github.com/Kr0ff/cve-2019-16278 | POC Details |
| 8 | CVE-2019-16278:Nostromo Web服务器的RCE漏洞 | https://github.com/NHPT/CVE-2019-16278 | POC Details |
| 9 | Exploit for the CVE-2019-16278 vulnerability | https://github.com/keshiba/cve-2019-16278 | POC Details |
| 10 | None | https://github.com/crypticdante/CVE-2019-16278 | POC Details |
| 11 | A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments. | https://github.com/alexander-fernandes/CVE-2019-16278 | POC Details |
| 12 | This is a exploit of CVE-2019-16278 for Nostromo 1.9.6 RCE. This exploit allows RCE on the victim machine. | https://github.com/FredBrave/CVE-2019-16278-Nostromo-1.9.6-RCE | POC Details |
| 13 | Nostromo 1.9.6 reverse shell | https://github.com/0xTabun/CVE-2019-16278 | POC Details |
| 14 | None | https://github.com/H3xL00m/CVE-2019-16278 | POC Details |
| 15 | Python script to exploit RCE in Nostromo nhttpd <= 1.9.6. | https://github.com/aN0mad/CVE-2019-16278-Nostromo_1.9.6-RCE | POC Details |
| 16 | None | https://github.com/n3ov4n1sh/CVE-2019-16278 | POC Details |
| 17 | None | https://github.com/c0d3cr4f73r/CVE-2019-16278 | POC Details |
| 18 | None | https://github.com/Sp3c73rSh4d0w/CVE-2019-16278 | POC Details |
| 19 | None | https://github.com/0xwh1pl4sh/CVE-2019-16278 | POC Details |
| 20 | None | https://github.com/N3rdyN3xus/CVE-2019-16278 | POC Details |
| 21 | None | https://github.com/NyxByt3/CVE-2019-16278 | POC Details |
| 22 | None | https://github.com/h3xcr4ck3r/CVE-2019-16278 | POC Details |
| 23 | None | https://github.com/n3rdh4x0r/CVE-2019-16278 | POC Details |
| 24 | This repository contains an exploit for CVE-2019-16278 in Nostromo Web Server 1.9.6, allowing remote code execution via a directory traversal vulnerability. The script uses pwntools to establish a reverse shell. For educational and authorized testing use only. | https://github.com/cancela24/CVE-2019-16278-Nostromo-1.9.6-RCE | POC Details |
| 25 | An unauthenticated attacker can force server points to a shell file like ‘/bin/sh’ and execute arbitrary commands due to the failure in verifying the URL which leads to path traversal to any file that exists in the system. Nostromo’s versions such as 1.9.6 fail to verify this URL | https://github.com/CybermonkX/CVE-2019-16278_Nostromo-1.9.6---Remote-Code-Execution | POC Details |
| 26 | nostromo nhttpd through 1.9.6 allows an attacker to achieve remote code execution via directory traversal in the function http_verify. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-16278.yaml | POC Details |
| 27 | None | https://github.com/h3x0v3rl0rd/CVE-2019-16278 | POC Details |
| 28 | Remote Code Execution exploit for Nostromo nhttpd ≤ 1.9.6. Exploits directory traversal vulnerability using URL-encoded CRLF characters to execute arbitrary commands | https://github.com/andknownmaly/CVE-2019-16278 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet