2021-01-10 10:09:54 +01:00
[
2022-08-05 02:16:53 +02:00
{
"id" : 176976251 ,
"name" : "CVE-2019-5420" ,
"full_name" : "knqyf263\/CVE-2019-5420" ,
"owner" : {
"login" : "knqyf263" ,
"id" : 2253692 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/knqyf263" ,
"user_view_type" : "public"
2022-08-05 02:16:53 +02:00
} ,
"html_url" : "https:\/\/github.com\/knqyf263\/CVE-2019-5420" ,
"description" : "CVE-2019-5420 (Ruby on Rails)" ,
"fork" : false ,
"created_at" : "2019-03-21T15:42:54Z" ,
2023-02-17 07:33:56 +01:00
"updated_at" : "2023-02-17T03:06:47Z" ,
2022-08-05 02:16:53 +02:00
"pushed_at" : "2019-03-21T23:52:48Z" ,
2023-02-17 07:33:56 +01:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2022-08-05 02:16:53 +02:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-02-17 07:33:56 +01:00
"watchers" : 8 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2022-08-05 02:16:53 +02:00
} ,
2021-04-04 17:10:08 +02:00
{
"id" : 178050921 ,
"name" : "cve-2019-5420" ,
"full_name" : "cved-sources\/cve-2019-5420" ,
"owner" : {
"login" : "cved-sources" ,
"id" : 46423677 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/cved-sources" ,
"user_view_type" : "public"
2021-04-04 17:10:08 +02:00
} ,
"html_url" : "https:\/\/github.com\/cved-sources\/cve-2019-5420" ,
"description" : "cve-2019-5420" ,
"fork" : false ,
"created_at" : "2019-03-27T18:16:46Z" ,
2021-04-16 05:11:02 +02:00
"updated_at" : "2021-04-15T22:54:41Z" ,
2023-01-19 19:32:19 +01:00
"pushed_at" : "2023-01-19T12:16:29Z" ,
2021-04-04 17:10:08 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2021-04-04 17:10:08 +02:00
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-04-04 17:10:08 +02:00
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
2023-12-24 07:27:03 +01:00
{
"id" : 328768715 ,
"name" : "CVE-2019-5420" ,
"full_name" : "AnasTaoutaou\/CVE-2019-5420" ,
"owner" : {
"login" : "AnasTaoutaou" ,
"id" : 10848894 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/10848894?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/AnasTaoutaou" ,
"user_view_type" : "public"
2023-12-24 07:27:03 +01:00
} ,
"html_url" : "https:\/\/github.com\/AnasTaoutaou\/CVE-2019-5420" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-01-11T19:23:01Z" ,
"updated_at" : "2021-01-11T19:24:33Z" ,
"pushed_at" : "2021-01-11T19:24:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-10-12 20:27:51 +02:00
{
"id" : 331342400 ,
"name" : "CVE-2019-5420" ,
"full_name" : "Eremiel\/CVE-2019-5420" ,
"owner" : {
"login" : "Eremiel" ,
"id" : 32537197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/Eremiel" ,
"user_view_type" : "public"
2023-10-12 20:27:51 +02:00
} ,
"html_url" : "https:\/\/github.com\/Eremiel\/CVE-2019-5420" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-01-20T15:06:58Z" ,
"updated_at" : "2021-01-20T15:14:12Z" ,
"pushed_at" : "2021-01-20T15:14:10Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
2023-01-07 01:35:14 +01:00
{
"id" : 366358815 ,
"name" : "CVE-2019-5420.rb" ,
"full_name" : "scumdestroy\/CVE-2019-5420.rb" ,
"owner" : {
"login" : "scumdestroy" ,
"id" : 35894688 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/scumdestroy" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb" ,
"description" : "POC Exploit written in Ruby" ,
"fork" : false ,
"created_at" : "2021-05-11T11:32:18Z" ,
2024-03-30 19:27:18 +01:00
"updated_at" : "2024-03-30T12:55:53Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-01-12T02:39:51Z" ,
2024-03-30 19:27:18 +01:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-03-30 19:27:18 +01:00
"watchers" : 2 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 403614421 ,
"name" : "CVE-2019-5420" ,
"full_name" : "j4k0m\/CVE-2019-5420" ,
"owner" : {
"login" : "j4k0m" ,
"id" : 48088579 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/j4k0m" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/j4k0m\/CVE-2019-5420" ,
"description" : "A vulnerability can allow an attacker to guess the automatically generated development mode secret token." ,
"fork" : false ,
"created_at" : "2021-09-06T12:28:05Z" ,
2024-01-15 01:33:19 +01:00
"updated_at" : "2024-01-14T22:39:28Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2021-09-07T13:11:02Z" ,
2024-01-15 01:33:19 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-01-15 01:33:19 +01:00
"watchers" : 5 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 425154730 ,
"name" : "CVE-2019-5420-RCE" ,
"full_name" : "mmeza-developer\/CVE-2019-5420-RCE" ,
"owner" : {
"login" : "mmeza-developer" ,
"id" : 20251063 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/mmeza-developer" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/mmeza-developer\/CVE-2019-5420-RCE" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-11-06T04:24:43Z" ,
"updated_at" : "2021-11-06T04:25:00Z" ,
"pushed_at" : "2021-11-06T04:24:58Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 469838090 ,
"name" : "CVE-2019-5420" ,
"full_name" : "trickstersec\/CVE-2019-5420" ,
"owner" : {
"login" : "trickstersec" ,
"id" : 22165282 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22165282?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/trickstersec" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/trickstersec\/CVE-2019-5420" ,
"description" : "Exploit for the Rails CVE-2019-5420" ,
"fork" : false ,
"created_at" : "2022-03-14T17:29:47Z" ,
"updated_at" : "2022-03-14T17:43:03Z" ,
"pushed_at" : "2022-03-14T17:46:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 500379970 ,
"name" : "CVE-2019-5420" ,
"full_name" : "PenTestical\/CVE-2019-5420" ,
"owner" : {
"login" : "PenTestical" ,
"id" : 57206134 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/PenTestical" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/PenTestical\/CVE-2019-5420" ,
"description" : " Exploit in Rails Development Mode. With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit." ,
"fork" : false ,
"created_at" : "2022-06-06T10:01:35Z" ,
2023-02-19 19:30:08 +01:00
"updated_at" : "2023-02-19T12:43:46Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-06-06T10:16:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2019-5420"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 01:35:14 +01:00
} ,
{
"id" : 509795175 ,
"name" : "ruby-RCE-CVE-2019-5420-" ,
"full_name" : "laffray\/ruby-RCE-CVE-2019-5420-" ,
"owner" : {
"login" : "laffray" ,
"id" : 43429412 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43429412?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/laffray" ,
"user_view_type" : "public"
2023-01-07 01:35:14 +01:00
} ,
"html_url" : "https:\/\/github.com\/laffray\/ruby-RCE-CVE-2019-5420-" ,
"description" : "Ruby反序列化命令执行漏洞( CVE-2019-5420) -vulfocus通关版" ,
"fork" : false ,
"created_at" : "2022-07-02T15:44:03Z" ,
2024-09-29 20:30:07 +02:00
"updated_at" : "2024-09-29T16:00:10Z" ,
2023-01-07 01:35:14 +01:00
"pushed_at" : "2022-07-02T15:48:28Z" ,
2024-09-29 20:30:07 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2023-01-07 01:35:14 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-09-29 20:30:07 +02:00
"watchers" : 5 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2021-01-10 10:09:54 +01:00
}
]