PoC-in-GitHub/2019/CVE-2019-5418.json

48 lines
1.6 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
2019-12-12 06:14:27 +01:00
"id": 177236589,
"name": "Rails-doubletap-RCE",
"full_name": "mpgn\/Rails-doubletap-RCE",
2019-12-12 05:48:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
2019-12-12 05:48:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/mpgn\/Rails-doubletap-RCE",
"description": "RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)",
2019-12-12 05:48:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-03-23T02:52:31Z",
2020-11-30 16:10:06 +01:00
"updated_at": "2020-11-30T10:28:47Z",
2020-06-25 11:10:12 +02:00
"pushed_at": "2020-06-25T06:13:09Z",
2020-11-30 16:10:06 +01:00
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 23,
"forks": 23,
"watchers": 105,
2019-12-12 05:48:20 +01:00
"score": 0
2020-10-04 11:11:39 +02:00
},
{
"id": 222660643,
"name": "CVE-2019-5418",
"full_name": "random-robbie\/CVE-2019-5418",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/CVE-2019-5418",
"description": null,
"fork": false,
"created_at": "2019-11-19T09:40:06Z",
"updated_at": "2019-12-11T18:52:58Z",
"pushed_at": "2019-11-19T09:41:18Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
2019-12-08 14:19:20 +01:00
}
]