[ { "id": 184600046, "name": "CVE-2019-5624", "full_name": "VoidSec\/CVE-2019-5624", "owner": { "login": "VoidSec", "id": 5717603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4", "html_url": "https:\/\/github.com\/VoidSec" }, "html_url": "https:\/\/github.com\/VoidSec\/CVE-2019-5624", "description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ", "fork": false, "created_at": "2019-05-02T14:54:08Z", "updated_at": "2021-07-07T10:48:41Z", "pushed_at": "2019-05-02T15:15:51Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2019-5624", "exploit", "metasploit", "metasploit-framework", "poc", "rce", "rubyzip" ], "visibility": "public", "forks": 7, "watchers": 14, "score": 0 } ]