PoC-in-GitHub/2019/CVE-2019-5418.json

25 lines
878 B
JSON
Raw Normal View History

2019-12-08 22:19:20 +09:00
[
{
2019-12-12 14:14:27 +09:00
"id": 177236589,
"name": "Rails-doubletap-RCE",
"full_name": "mpgn\/Rails-doubletap-RCE",
2019-12-12 13:48:20 +09:00
"owner": {
2019-12-12 14:14:27 +09:00
"login": "mpgn",
"id": 5891788,
2021-01-22 00:10:20 +09:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/mpgn"
2019-12-12 13:48:20 +09:00
},
2019-12-12 14:14:27 +09:00
"html_url": "https:\/\/github.com\/mpgn\/Rails-doubletap-RCE",
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
2019-12-12 13:48:20 +09:00
"fork": false,
2019-12-12 14:14:27 +09:00
"created_at": "2019-03-23T02:52:31Z",
2021-02-07 18:09:16 +09:00
"updated_at": "2021-02-07T04:25:07Z",
2020-06-25 18:10:12 +09:00
"pushed_at": "2020-06-25T06:13:09Z",
2021-02-07 18:09:16 +09:00
"stargazers_count": 106,
"watchers_count": 106,
2021-02-16 06:09:18 +09:00
"forks_count": 25,
"forks": 25,
2021-02-07 18:09:16 +09:00
"watchers": 106,
2019-12-12 13:48:20 +09:00
"score": 0
2019-12-08 22:19:20 +09:00
}
]