PoC-in-GitHub/2019/CVE-2019-5420.json

274 lines
9.2 KiB
JSON
Raw Normal View History

2021-01-10 10:09:54 +01:00
[
2021-04-04 17:10:08 +02:00
{
"id": 176976251,
"name": "CVE-2019-5420",
"full_name": "knqyf263\/CVE-2019-5420",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420",
"description": "CVE-2019-5420 (Ruby on Rails)",
"fork": false,
"created_at": "2019-03-21T15:42:54Z",
2022-01-30 07:14:02 +01:00
"updated_at": "2022-01-30T05:54:37Z",
2021-04-04 17:10:08 +02:00
"pushed_at": "2019-03-21T23:52:48Z",
2022-01-30 07:14:02 +01:00
"stargazers_count": 9,
"watchers_count": 9,
2021-04-04 17:10:08 +02:00
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-04-04 17:10:08 +02:00
"forks": 0,
2022-01-30 07:14:02 +01:00
"watchers": 9,
2021-04-04 17:10:08 +02:00
"score": 0
},
{
"id": 178050921,
"name": "cve-2019-5420",
"full_name": "cved-sources\/cve-2019-5420",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2019-5420",
"description": "cve-2019-5420",
"fork": false,
"created_at": "2019-03-27T18:16:46Z",
2021-04-16 05:11:02 +02:00
"updated_at": "2021-04-15T22:54:41Z",
2022-05-19 02:15:20 +02:00
"pushed_at": "2022-05-18T22:15:49Z",
2021-04-04 17:10:08 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-04-04 17:10:08 +02:00
"forks": 0,
"watchers": 0,
"score": 0
},
2021-01-11 22:10:10 +01:00
{
"id": 328768715,
"name": "CVE-2019-5420",
"full_name": "AnasTaoutaou\/CVE-2019-5420",
"owner": {
"login": "AnasTaoutaou",
"id": 10848894,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10848894?v=4",
2021-01-11 22:10:10 +01:00
"html_url": "https:\/\/github.com\/AnasTaoutaou"
},
"html_url": "https:\/\/github.com\/AnasTaoutaou\/CVE-2019-5420",
"description": null,
"fork": false,
"created_at": "2021-01-11T19:23:01Z",
"updated_at": "2021-01-11T19:24:33Z",
"pushed_at": "2021-01-11T19:24:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-01-11 22:10:10 +01:00
"forks": 0,
"watchers": 0,
"score": 0
2021-01-20 16:10:33 +01:00
},
{
"id": 331342400,
"name": "CVE-2019-5420",
"full_name": "Eremiel\/CVE-2019-5420",
"owner": {
"login": "Eremiel",
"id": 32537197,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4",
2021-01-20 16:10:33 +01:00
"html_url": "https:\/\/github.com\/Eremiel"
},
"html_url": "https:\/\/github.com\/Eremiel\/CVE-2019-5420",
"description": null,
"fork": false,
"created_at": "2021-01-20T15:06:58Z",
2021-01-20 22:10:05 +01:00
"updated_at": "2021-01-20T15:14:12Z",
"pushed_at": "2021-01-20T15:14:10Z",
2021-01-20 16:10:33 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-01-20 16:10:33 +01:00
"forks": 0,
"watchers": 0,
"score": 0
2021-05-11 17:12:55 +02:00
},
{
"id": 366358815,
"name": "CVE-2019-5420.rb",
"full_name": "scumdestroy\/CVE-2019-5420.rb",
"owner": {
"login": "scumdestroy",
"id": 35894688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4",
"html_url": "https:\/\/github.com\/scumdestroy"
},
"html_url": "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb",
"description": "POC Exploit written in Ruby",
"fork": false,
"created_at": "2021-05-11T11:32:18Z",
2022-01-01 19:13:25 +01:00
"updated_at": "2022-01-01T12:10:58Z",
2022-01-12 07:16:11 +01:00
"pushed_at": "2022-01-12T02:39:51Z",
2022-01-01 19:13:25 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2021-05-11 17:12:55 +02:00
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-05-11 17:12:55 +02:00
"forks": 0,
2022-01-01 19:13:25 +01:00
"watchers": 1,
2021-05-11 17:12:55 +02:00
"score": 0
2021-09-06 17:14:46 +02:00
},
{
"id": 403614421,
"name": "CVE-2019-5420",
2022-03-13 19:14:13 +01:00
"full_name": "j4k0m\/CVE-2019-5420",
2021-09-06 17:14:46 +02:00
"owner": {
2022-03-13 19:14:13 +01:00
"login": "j4k0m",
2021-09-06 17:14:46 +02:00
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
2022-03-13 19:14:13 +01:00
"html_url": "https:\/\/github.com\/j4k0m"
2021-09-06 17:14:46 +02:00
},
2022-03-13 19:14:13 +01:00
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2019-5420",
2021-09-06 17:14:46 +02:00
"description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.",
"fork": false,
"created_at": "2021-09-06T12:28:05Z",
2021-09-18 05:12:51 +02:00
"updated_at": "2021-09-17T23:56:55Z",
2021-09-07 17:13:16 +02:00
"pushed_at": "2021-09-07T13:11:02Z",
2021-09-18 05:12:51 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2021-09-06 17:14:46 +02:00
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-06 17:14:46 +02:00
"forks": 0,
2021-09-18 05:12:51 +02:00
"watchers": 2,
2021-09-06 17:14:46 +02:00
"score": 0
2021-11-06 07:12:56 +01:00
},
{
"id": 425154730,
"name": "CVE-2019-5420-RCE",
"full_name": "mmeza-developer\/CVE-2019-5420-RCE",
"owner": {
"login": "mmeza-developer",
"id": 20251063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4",
"html_url": "https:\/\/github.com\/mmeza-developer"
},
"html_url": "https:\/\/github.com\/mmeza-developer\/CVE-2019-5420-RCE",
"description": null,
"fork": false,
"created_at": "2021-11-06T04:24:43Z",
"updated_at": "2021-11-06T04:25:00Z",
"pushed_at": "2021-11-06T04:24:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-01-31 01:15:10 +01:00
},
{
"id": 453783291,
"name": "CVE-2019-5420-POC",
"full_name": "CyberSecurityUP\/CVE-2019-5420-POC",
"owner": {
"login": "CyberSecurityUP",
"id": 34966120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34966120?v=4",
"html_url": "https:\/\/github.com\/CyberSecurityUP"
},
"html_url": "https:\/\/github.com\/CyberSecurityUP\/CVE-2019-5420-POC",
"description": null,
"fork": false,
"created_at": "2022-01-30T19:42:52Z",
"updated_at": "2022-01-30T19:43:47Z",
"pushed_at": "2022-01-30T21:27:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-03-14 19:14:44 +01:00
},
{
"id": 469838090,
"name": "CVE-2019-5420",
"full_name": "trickstersec\/CVE-2019-5420",
"owner": {
"login": "trickstersec",
"id": 22165282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165282?v=4",
"html_url": "https:\/\/github.com\/trickstersec"
},
"html_url": "https:\/\/github.com\/trickstersec\/CVE-2019-5420",
"description": "Exploit for the Rails CVE-2019-5420",
"fork": false,
"created_at": "2022-03-14T17:29:47Z",
"updated_at": "2022-03-14T17:43:03Z",
"pushed_at": "2022-03-14T17:46:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-06 14:21:04 +02:00
},
{
"id": 500379970,
"name": "CVE-2019-5420",
"full_name": "PenTestical\/CVE-2019-5420",
"owner": {
"login": "PenTestical",
"id": 57206134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4",
"html_url": "https:\/\/github.com\/PenTestical"
},
"html_url": "https:\/\/github.com\/PenTestical\/CVE-2019-5420",
"description": " Exploit in Rails Development Mode. With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.",
"fork": false,
"created_at": "2022-06-06T10:01:35Z",
"updated_at": "2022-06-06T10:14:52Z",
"pushed_at": "2022-06-06T10:16:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-5420"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-01-10 10:09:54 +01:00
}
]