[ { "id": 176976251, "name": "CVE-2019-5420", "full_name": "knqyf263\/CVE-2019-5420", "owner": { "login": "knqyf263", "id": 2253692, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4", "html_url": "https:\/\/github.com\/knqyf263" }, "html_url": "https:\/\/github.com\/knqyf263\/CVE-2019-5420", "description": "CVE-2019-5420 (Ruby on Rails)", "fork": false, "created_at": "2019-03-21T15:42:54Z", "updated_at": "2022-08-01T02:16:28Z", "pushed_at": "2019-03-21T23:52:48Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 8, "score": 0 }, { "id": 178050921, "name": "cve-2019-5420", "full_name": "cved-sources\/cve-2019-5420", "owner": { "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", "html_url": "https:\/\/github.com\/cved-sources" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2019-5420", "description": "cve-2019-5420", "fork": false, "created_at": "2019-03-27T18:16:46Z", "updated_at": "2021-04-15T22:54:41Z", "pushed_at": "2022-07-22T03:01:53Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 328768715, "name": "CVE-2019-5420", "full_name": "AnasTaoutaou\/CVE-2019-5420", "owner": { "login": "AnasTaoutaou", "id": 10848894, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10848894?v=4", "html_url": "https:\/\/github.com\/AnasTaoutaou" }, "html_url": "https:\/\/github.com\/AnasTaoutaou\/CVE-2019-5420", "description": null, "fork": false, "created_at": "2021-01-11T19:23:01Z", "updated_at": "2021-01-11T19:24:33Z", "pushed_at": "2021-01-11T19:24:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 331342400, "name": "CVE-2019-5420", "full_name": "Eremiel\/CVE-2019-5420", "owner": { "login": "Eremiel", "id": 32537197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32537197?v=4", "html_url": "https:\/\/github.com\/Eremiel" }, "html_url": "https:\/\/github.com\/Eremiel\/CVE-2019-5420", "description": null, "fork": false, "created_at": "2021-01-20T15:06:58Z", "updated_at": "2021-01-20T15:14:12Z", "pushed_at": "2021-01-20T15:14:10Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 366358815, "name": "CVE-2019-5420.rb", "full_name": "scumdestroy\/CVE-2019-5420.rb", "owner": { "login": "scumdestroy", "id": 35894688, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4", "html_url": "https:\/\/github.com\/scumdestroy" }, "html_url": "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb", "description": "POC Exploit written in Ruby", "fork": false, "created_at": "2021-05-11T11:32:18Z", "updated_at": "2022-01-01T12:10:58Z", "pushed_at": "2022-01-12T02:39:51Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 403614421, "name": "CVE-2019-5420", "full_name": "j4k0m\/CVE-2019-5420", "owner": { "login": "j4k0m", "id": 48088579, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4", "html_url": "https:\/\/github.com\/j4k0m" }, "html_url": "https:\/\/github.com\/j4k0m\/CVE-2019-5420", "description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.", "fork": false, "created_at": "2021-09-06T12:28:05Z", "updated_at": "2022-08-01T09:40:02Z", "pushed_at": "2021-09-07T13:11:02Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 425154730, "name": "CVE-2019-5420-RCE", "full_name": "mmeza-developer\/CVE-2019-5420-RCE", "owner": { "login": "mmeza-developer", "id": 20251063, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4", "html_url": "https:\/\/github.com\/mmeza-developer" }, "html_url": "https:\/\/github.com\/mmeza-developer\/CVE-2019-5420-RCE", "description": null, "fork": false, "created_at": "2021-11-06T04:24:43Z", "updated_at": "2021-11-06T04:25:00Z", "pushed_at": "2021-11-06T04:24:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 453783291, "name": "CVE-2019-5420-POC", "full_name": "CyberSecurityUP\/CVE-2019-5420-POC", "owner": { "login": "CyberSecurityUP", "id": 34966120, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34966120?v=4", "html_url": "https:\/\/github.com\/CyberSecurityUP" }, "html_url": "https:\/\/github.com\/CyberSecurityUP\/CVE-2019-5420-POC", "description": null, "fork": false, "created_at": "2022-01-30T19:42:52Z", "updated_at": "2022-07-23T12:23:22Z", "pushed_at": "2022-01-30T21:27:49Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 469838090, "name": "CVE-2019-5420", "full_name": "trickstersec\/CVE-2019-5420", "owner": { "login": "trickstersec", "id": 22165282, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22165282?v=4", "html_url": "https:\/\/github.com\/trickstersec" }, "html_url": "https:\/\/github.com\/trickstersec\/CVE-2019-5420", "description": "Exploit for the Rails CVE-2019-5420", "fork": false, "created_at": "2022-03-14T17:29:47Z", "updated_at": "2022-03-14T17:43:03Z", "pushed_at": "2022-03-14T17:46:27Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 500379970, "name": "CVE-2019-5420", "full_name": "PenTestical\/CVE-2019-5420", "owner": { "login": "PenTestical", "id": 57206134, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4", "html_url": "https:\/\/github.com\/PenTestical" }, "html_url": "https:\/\/github.com\/PenTestical\/CVE-2019-5420", "description": " Exploit in Rails Development Mode. With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.", "fork": false, "created_at": "2022-06-06T10:01:35Z", "updated_at": "2022-06-06T10:14:52Z", "pushed_at": "2022-06-06T10:16:34Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2019-5420" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 509795175, "name": "ruby-RCE-CVE-2019-5420-", "full_name": "laffray\/ruby-RCE-CVE-2019-5420-", "owner": { "login": "laffray", "id": 43429412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43429412?v=4", "html_url": "https:\/\/github.com\/laffray" }, "html_url": "https:\/\/github.com\/laffray\/ruby-RCE-CVE-2019-5420-", "description": "Ruby反序列化命令执行漏洞(CVE-2019-5420)-vulfocus通关版", "fork": false, "created_at": "2022-07-02T15:44:03Z", "updated_at": "2022-07-20T14:06:47Z", "pushed_at": "2022-07-02T15:48:28Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 } ]