[ { "id": 550911062, "name": "CVE-2022-40684", "full_name": "horizon3ai\/CVE-2022-40684", "owner": { "login": "horizon3ai", "id": 79593994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", "html_url": "https:\/\/github.com\/horizon3ai" }, "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-40684", "description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T14:24:12Z", "updated_at": "2022-10-14T06:17:36Z", "pushed_at": "2022-10-13T15:25:00Z", "stargazers_count": 73, "watchers_count": 73, "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 28, "watchers": 73, "score": 0 }, { "id": 551028490, "name": "CVE-2022-40684", "full_name": "carlosevieira\/CVE-2022-40684", "owner": { "login": "carlosevieira", "id": 24918013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24918013?v=4", "html_url": "https:\/\/github.com\/carlosevieira" }, "html_url": "https:\/\/github.com\/carlosevieira\/CVE-2022-40684", "description": "PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)", "fork": false, "created_at": "2022-10-13T18:13:59Z", "updated_at": "2022-10-14T06:03:29Z", "pushed_at": "2022-10-13T20:13:44Z", "stargazers_count": 31, "watchers_count": 31, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 31, "score": 0 }, { "id": 551073912, "name": "Fortinet-PoC-Auth-Bypass", "full_name": "Filiplain\/Fortinet-PoC-Auth-Bypass", "owner": { "login": "Filiplain", "id": 85502601, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85502601?v=4", "html_url": "https:\/\/github.com\/Filiplain" }, "html_url": "https:\/\/github.com\/Filiplain\/Fortinet-PoC-Auth-Bypass", "description": "Bash PoC for Fortinet Auth Bypass - CVE-2022-40684", "fork": false, "created_at": "2022-10-13T19:53:17Z", "updated_at": "2022-10-14T03:25:44Z", "pushed_at": "2022-10-13T20:20:39Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 551104587, "name": "CVE-2022-40684-POC", "full_name": "kljunowsky\/CVE-2022-40684-POC", "owner": { "login": "kljunowsky", "id": 104329412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4", "html_url": "https:\/\/github.com\/kljunowsky" }, "html_url": "https:\/\/github.com\/kljunowsky\/CVE-2022-40684-POC", "description": "Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager", "fork": false, "created_at": "2022-10-13T21:07:50Z", "updated_at": "2022-10-14T04:19:59Z", "pushed_at": "2022-10-13T21:15:16Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "authentication-bypass", "bugbounty", "cve-2022-40684", "exploit", "fortios", "fortiproxy", "penetration-testing", "poc", "security" ], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 551185144, "name": "CVE-2022-40684", "full_name": "secunnix\/CVE-2022-40684", "owner": { "login": "secunnix", "id": 104568161, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104568161?v=4", "html_url": "https:\/\/github.com\/secunnix" }, "html_url": "https:\/\/github.com\/secunnix\/CVE-2022-40684", "description": null, "fork": false, "created_at": "2022-10-14T01:07:01Z", "updated_at": "2022-10-14T01:09:23Z", "pushed_at": "2022-10-14T01:09:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]