PoC-in-GitHub/2020/CVE-2020-5410.json
2022-12-30 03:25:25 +09:00

89 lines
No EOL
3.2 KiB
JSON

[
{
"id": 268974025,
"name": "config-demo",
"full_name": "dead5nd\/config-demo",
"owner": {
"login": "dead5nd",
"id": 29460919,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29460919?v=4",
"html_url": "https:\/\/github.com\/dead5nd"
},
"html_url": "https:\/\/github.com\/dead5nd\/config-demo",
"description": "CVE-2020-5410",
"fork": false,
"created_at": "2020-06-03T02:52:09Z",
"updated_at": "2020-06-03T02:58:48Z",
"pushed_at": "2020-06-03T02:58:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 272803463,
"name": "CVE-2020-5410-POC",
"full_name": "osamahamad\/CVE-2020-5410-POC",
"owner": {
"login": "osamahamad",
"id": 59566963,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59566963?v=4",
"html_url": "https:\/\/github.com\/osamahamad"
},
"html_url": "https:\/\/github.com\/osamahamad\/CVE-2020-5410-POC",
"description": "CVE-2020-5410 Spring Cloud Config directory traversal vulnerability",
"fork": false,
"created_at": "2020-06-16T20:15:58Z",
"updated_at": "2022-11-09T18:08:12Z",
"pushed_at": "2020-06-16T20:38:41Z",
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 28,
"score": 0
},
{
"id": 583384254,
"name": "CVE-2020-5410",
"full_name": "Live-Hack-CVE\/CVE-2020-5410",
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-5410",
"description": "Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a di CVE project by @Sn0wAlice",
"fork": false,
"created_at": "2022-12-29T16:07:52Z",
"updated_at": "2022-12-29T16:07:52Z",
"pushed_at": "2022-12-29T16:07:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]