mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
314 lines
11 KiB
JSON
314 lines
11 KiB
JSON
|
[
|
|||
|
{
|
|||
|
"id": 176976251,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "knqyf263\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "knqyf263",
|
|||
|
"id": 2253692,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/knqyf263",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420",
|
|||
|
"description": "CVE-2019-5420 (Ruby on Rails)",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2019-03-21T15:42:54Z",
|
|||
|
"updated_at": "2023-02-17T03:06:47Z",
|
|||
|
"pushed_at": "2019-03-21T23:52:48Z",
|
|||
|
"stargazers_count": 8,
|
|||
|
"watchers_count": 8,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 8,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 2
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 178050921,
|
|||
|
"name": "cve-2019-5420",
|
|||
|
"full_name": "cved-sources\/cve-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "cved-sources",
|
|||
|
"id": 46423677,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/cved-sources",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-5420",
|
|||
|
"description": "cve-2019-5420",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2019-03-27T18:16:46Z",
|
|||
|
"updated_at": "2021-04-15T22:54:41Z",
|
|||
|
"pushed_at": "2023-01-19T12:16:29Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 328768715,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "AnasTaoutaou\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "AnasTaoutaou",
|
|||
|
"id": 10848894,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10848894?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/AnasTaoutaou",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/AnasTaoutaou\/CVE-2019-5420",
|
|||
|
"description": null,
|
|||
|
"fork": false,
|
|||
|
"created_at": "2021-01-11T19:23:01Z",
|
|||
|
"updated_at": "2021-01-11T19:24:33Z",
|
|||
|
"pushed_at": "2021-01-11T19:24:31Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 331342400,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "Eremiel\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "Eremiel",
|
|||
|
"id": 32537197,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/Eremiel",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/Eremiel\/CVE-2019-5420",
|
|||
|
"description": null,
|
|||
|
"fork": false,
|
|||
|
"created_at": "2021-01-20T15:06:58Z",
|
|||
|
"updated_at": "2021-01-20T15:14:12Z",
|
|||
|
"pushed_at": "2021-01-20T15:14:10Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 2
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 366358815,
|
|||
|
"name": "CVE-2019-5420.rb",
|
|||
|
"full_name": "scumdestroy\/CVE-2019-5420.rb",
|
|||
|
"owner": {
|
|||
|
"login": "scumdestroy",
|
|||
|
"id": 35894688,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/scumdestroy",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb",
|
|||
|
"description": "POC Exploit written in Ruby",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2021-05-11T11:32:18Z",
|
|||
|
"updated_at": "2024-03-30T12:55:53Z",
|
|||
|
"pushed_at": "2022-01-12T02:39:51Z",
|
|||
|
"stargazers_count": 2,
|
|||
|
"watchers_count": 2,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 2,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 403614421,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "j4k0m\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "j4k0m",
|
|||
|
"id": 48088579,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/j4k0m",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2019-5420",
|
|||
|
"description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2021-09-06T12:28:05Z",
|
|||
|
"updated_at": "2024-01-14T22:39:28Z",
|
|||
|
"pushed_at": "2021-09-07T13:11:02Z",
|
|||
|
"stargazers_count": 5,
|
|||
|
"watchers_count": 5,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 5,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 2
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 425154730,
|
|||
|
"name": "CVE-2019-5420-RCE",
|
|||
|
"full_name": "mmeza-developer\/CVE-2019-5420-RCE",
|
|||
|
"owner": {
|
|||
|
"login": "mmeza-developer",
|
|||
|
"id": 20251063,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/mmeza-developer",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/mmeza-developer\/CVE-2019-5420-RCE",
|
|||
|
"description": null,
|
|||
|
"fork": false,
|
|||
|
"created_at": "2021-11-06T04:24:43Z",
|
|||
|
"updated_at": "2021-11-06T04:25:00Z",
|
|||
|
"pushed_at": "2021-11-06T04:24:58Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 469838090,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "trickstersec\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "trickstersec",
|
|||
|
"id": 22165282,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165282?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/trickstersec",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/trickstersec\/CVE-2019-5420",
|
|||
|
"description": "Exploit for the Rails CVE-2019-5420",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2022-03-14T17:29:47Z",
|
|||
|
"updated_at": "2022-03-14T17:43:03Z",
|
|||
|
"pushed_at": "2022-03-14T17:46:27Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 500379970,
|
|||
|
"name": "CVE-2019-5420",
|
|||
|
"full_name": "PenTestical\/CVE-2019-5420",
|
|||
|
"owner": {
|
|||
|
"login": "PenTestical",
|
|||
|
"id": 57206134,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/PenTestical",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/PenTestical\/CVE-2019-5420",
|
|||
|
"description": " Exploit in Rails Development Mode. With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2022-06-06T10:01:35Z",
|
|||
|
"updated_at": "2023-02-19T12:43:46Z",
|
|||
|
"pushed_at": "2022-06-06T10:16:34Z",
|
|||
|
"stargazers_count": 0,
|
|||
|
"watchers_count": 0,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [
|
|||
|
"cve-2019-5420"
|
|||
|
],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 0,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
},
|
|||
|
{
|
|||
|
"id": 509795175,
|
|||
|
"name": "ruby-RCE-CVE-2019-5420-",
|
|||
|
"full_name": "laffray\/ruby-RCE-CVE-2019-5420-",
|
|||
|
"owner": {
|
|||
|
"login": "laffray",
|
|||
|
"id": 43429412,
|
|||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43429412?v=4",
|
|||
|
"html_url": "https:\/\/github.com\/laffray",
|
|||
|
"user_view_type": "public"
|
|||
|
},
|
|||
|
"html_url": "https:\/\/github.com\/laffray\/ruby-RCE-CVE-2019-5420-",
|
|||
|
"description": "Ruby反序列化命令执行漏洞(CVE-2019-5420)-vulfocus通关版",
|
|||
|
"fork": false,
|
|||
|
"created_at": "2022-07-02T15:44:03Z",
|
|||
|
"updated_at": "2024-09-29T16:00:10Z",
|
|||
|
"pushed_at": "2022-07-02T15:48:28Z",
|
|||
|
"stargazers_count": 5,
|
|||
|
"watchers_count": 5,
|
|||
|
"has_discussions": false,
|
|||
|
"forks_count": 0,
|
|||
|
"allow_forking": true,
|
|||
|
"is_template": false,
|
|||
|
"web_commit_signoff_required": false,
|
|||
|
"topics": [],
|
|||
|
"visibility": "public",
|
|||
|
"forks": 0,
|
|||
|
"watchers": 5,
|
|||
|
"score": 0,
|
|||
|
"subscribers_count": 1
|
|||
|
}
|
|||
|
]
|