[
    {
        "id": 120830531,
        "name": "CVE-2015-3224",
        "full_name": "0x00-0x00\/CVE-2015-3224",
        "owner": {
            "login": "0x00-0x00",
            "id": 23364530,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
            "html_url": "https:\/\/github.com\/0x00-0x00"
        },
        "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2015-3224",
        "description": "Modification of Metasploit module for RCE in Ruby-On-Rails Console CVE-2015-3224",
        "fork": false,
        "created_at": "2018-02-08T23:24:48Z",
        "updated_at": "2018-09-22T04:51:57Z",
        "pushed_at": "2018-02-08T23:39:07Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "forks_count": 3,
        "forks": 3,
        "watchers": 2,
        "score": 0
    },
    {
        "id": 131959523,
        "name": "cve-2015-3224",
        "full_name": "0xEval\/cve-2015-3224",
        "owner": {
            "login": "0xEval",
            "id": 19994887,
            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19994887?v=4",
            "html_url": "https:\/\/github.com\/0xEval"
        },
        "html_url": "https:\/\/github.com\/0xEval\/cve-2015-3224",
        "description": "Ruby on Rails Web Console (v2) Whitelist Bypass Code Execution implementation in Python",
        "fork": false,
        "created_at": "2018-05-03T07:41:33Z",
        "updated_at": "2019-01-15T16:25:53Z",
        "pushed_at": "2018-05-03T07:41:56Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 3,
        "forks": 3,
        "watchers": 1,
        "score": 0
    }
]