[ { "id": 120830531, "name": "CVE-2015-3224", "full_name": "0x00-0x00\/CVE-2015-3224", "owner": { "login": "0x00-0x00", "id": 23364530, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4", "html_url": "https:\/\/github.com\/0x00-0x00" }, "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2015-3224", "description": "Modification of Metasploit module for RCE in Ruby-On-Rails Console CVE-2015-3224", "fork": false, "created_at": "2018-02-08T23:24:48Z", "updated_at": "2018-09-22T04:51:57Z", "pushed_at": "2018-02-08T23:39:07Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "forks": 3, "watchers": 2, "score": 0 }, { "id": 131959523, "name": "cve-2015-3224", "full_name": "0xEval\/cve-2015-3224", "owner": { "login": "0xEval", "id": 19994887, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19994887?v=4", "html_url": "https:\/\/github.com\/0xEval" }, "html_url": "https:\/\/github.com\/0xEval\/cve-2015-3224", "description": "Ruby on Rails Web Console (v2) Whitelist Bypass Code Execution implementation in Python", "fork": false, "created_at": "2018-05-03T07:41:33Z", "updated_at": "2019-01-15T16:25:53Z", "pushed_at": "2018-05-03T07:41:56Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 4, "forks": 4, "watchers": 1, "score": 0 } ]