[
    {
        "id": 184600046,
        "name": "CVE-2019-5624",
        "full_name": "VoidSec\/CVE-2019-5624",
        "owner": {
            "login": "VoidSec",
            "id": 5717603,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
            "html_url": "https:\/\/github.com\/VoidSec"
        },
        "html_url": "https:\/\/github.com\/VoidSec\/CVE-2019-5624",
        "description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ",
        "fork": false,
        "created_at": "2019-05-02T14:54:08Z",
        "updated_at": "2024-01-12T13:10:43Z",
        "pushed_at": "2019-05-02T15:15:51Z",
        "stargazers_count": 14,
        "watchers_count": 14,
        "has_discussions": false,
        "forks_count": 7,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2019-5624",
            "exploit",
            "metasploit",
            "metasploit-framework",
            "poc",
            "rce",
            "rubyzip"
        ],
        "visibility": "public",
        "forks": 7,
        "watchers": 14,
        "score": 0,
        "subscribers_count": 4
    }
]