[ { "id": 184600046, "name": "CVE-2019-5624", "full_name": "VoidSec\/CVE-2019-5624", "owner": { "login": "VoidSec", "id": 5717603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4", "html_url": "https:\/\/github.com\/VoidSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VoidSec\/CVE-2019-5624", "description": "A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE) ", "fork": false, "created_at": "2019-05-02T14:54:08Z", "updated_at": "2024-08-12T19:48:30Z", "pushed_at": "2019-05-02T15:15:51Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2019-5624", "exploit", "metasploit", "metasploit-framework", "poc", "rce", "rubyzip" ], "visibility": "public", "forks": 7, "watchers": 13, "score": 0, "subscribers_count": 4 } ]