[ { "id": 7548360, "name": "name_reverser", "full_name": "terracatta\/name_reverser", "owner": { "login": "terracatta", "id": 315873, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/315873?v=4", "html_url": "https:\/\/github.com\/terracatta" }, "html_url": "https:\/\/github.com\/terracatta\/name_reverser", "description": "Silly Rails App to demonstrate vuln CVE-2013-0156", "fork": false, "created_at": "2013-01-10T20:46:08Z", "updated_at": "2016-09-04T16:47:42Z", "pushed_at": "2013-01-10T21:02:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 7552522, "name": "heroku-CVE-2013-0156", "full_name": "heroku\/heroku-CVE-2013-0156", "owner": { "login": "heroku", "id": 23211, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23211?v=4", "html_url": "https:\/\/github.com\/heroku" }, "html_url": "https:\/\/github.com\/heroku\/heroku-CVE-2013-0156", "description": "Inspect all of your heroku apps to see if they are running a vulnerable version of Rails", "fork": false, "created_at": "2013-01-11T02:13:48Z", "updated_at": "2024-10-16T20:38:41Z", "pushed_at": "2013-01-29T02:34:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 106 }, { "id": 7564614, "name": "crack-0.1.8-fixed", "full_name": "josal\/crack-0.1.8-fixed", "owner": { "login": "josal", "id": 88265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88265?v=4", "html_url": "https:\/\/github.com\/josal" }, "html_url": "https:\/\/github.com\/josal\/crack-0.1.8-fixed", "description": "crack repo from jnunemaker but with version 0.1.8 and rails CVE-2013-0156 vulnerability fixed", "fork": false, "created_at": "2013-01-11T18:21:57Z", "updated_at": "2016-09-04T16:47:30Z", "pushed_at": "2013-01-11T18:35:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 7575666, "name": "rails-exploit-cve-2013-0156", "full_name": "bsodmike\/rails-exploit-cve-2013-0156", "owner": { "login": "bsodmike", "id": 368260, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/368260?v=4", "html_url": "https:\/\/github.com\/bsodmike" }, "html_url": "https:\/\/github.com\/bsodmike\/rails-exploit-cve-2013-0156", "description": "Bootstrapped Rails 3.2.10 to test the remote code exploit CVE-2013-0156", "fork": false, "created_at": "2013-01-12T13:37:05Z", "updated_at": "2019-03-16T21:48:29Z", "pushed_at": "2013-01-13T09:27:27Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 188897438, "name": "CVE-2013-0156", "full_name": "R3dKn33-zz\/CVE-2013-0156", "owner": { "login": "R3dKn33-zz", "id": 31809058, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31809058?v=4", "html_url": "https:\/\/github.com\/R3dKn33-zz" }, "html_url": "https:\/\/github.com\/R3dKn33-zz\/CVE-2013-0156", "description": "Arbitrary deserialization that can be used to trigger SQL injection and even Code execution", "fork": false, "created_at": "2019-05-27T19:17:55Z", "updated_at": "2019-05-27T19:25:01Z", "pushed_at": "2019-05-27T19:24:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 672302842, "name": "kuang_grade_mk11", "full_name": "Jjdt12\/kuang_grade_mk11", "owner": { "login": "Jjdt12", "id": 140899832, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140899832?v=4", "html_url": "https:\/\/github.com\/Jjdt12" }, "html_url": "https:\/\/github.com\/Jjdt12\/kuang_grade_mk11", "description": "Pseudo shell for CVE-2013-0156. ", "fork": false, "created_at": "2023-07-29T15:57:15Z", "updated_at": "2023-07-29T15:58:49Z", "pushed_at": "2023-07-29T15:58:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 } ]