[ { "id": 120830531, "name": "CVE-2015-3224", "full_name": "0x00-0x00\/CVE-2015-3224", "owner": { "login": "0x00-0x00", "id": 23364530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23364530?v=4", "html_url": "https:\/\/github.com\/0x00-0x00" }, "html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2015-3224", "description": "Modification of Metasploit module for RCE in Ruby-On-Rails Console CVE-2015-3224", "fork": false, "created_at": "2018-02-08T23:24:48Z", "updated_at": "2018-09-22T04:51:57Z", "pushed_at": "2018-02-08T23:39:07Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "forks": 3, "watchers": 2, "score": 0 }, { "id": 131959523, "name": "cve-2015-3224", "full_name": "0xEval\/cve-2015-3224", "owner": { "login": "0xEval", "id": 19994887, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19994887?v=4", "html_url": "https:\/\/github.com\/0xEval" }, "html_url": "https:\/\/github.com\/0xEval\/cve-2015-3224", "description": "Ruby on Rails Web Console (v2) Whitelist Bypass Code Execution implementation in Python", "fork": false, "created_at": "2018-05-03T07:41:33Z", "updated_at": "2020-11-10T01:06:47Z", "pushed_at": "2018-05-03T07:41:56Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 4, "forks": 4, "watchers": 2, "score": 0 }, { "id": 342944268, "name": "CVE-2015-3224-", "full_name": "xda3m00n\/CVE-2015-3224-", "owner": { "login": "xda3m00n", "id": 45253703, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45253703?v=4", "html_url": "https:\/\/github.com\/xda3m00n" }, "html_url": "https:\/\/github.com\/xda3m00n\/CVE-2015-3224-", "description": "CVE-2015-3224 ", "fork": false, "created_at": "2021-02-27T19:47:14Z", "updated_at": "2021-02-27T19:50:15Z", "pushed_at": "2021-02-27T19:50:13Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]