[
    {
        "id": 586048910,
        "name": "CVE-2022-44149",
        "full_name": "yerodin\/CVE-2022-44149",
        "owner": {
            "login": "yerodin",
            "id": 9205071,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9205071?v=4",
            "html_url": "https:\/\/github.com\/yerodin",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/yerodin\/CVE-2022-44149",
        "description": "POC Exploit for CVE-2022-44149",
        "fork": false,
        "created_at": "2023-01-06T20:00:25Z",
        "updated_at": "2023-01-07T17:03:57Z",
        "pushed_at": "2023-01-25T03:08:51Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 840469662,
        "name": "CVE-2022-44149",
        "full_name": "geniuszlyy\/CVE-2022-44149",
        "owner": {
            "login": "geniuszlyy",
            "id": 137893386,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4",
            "html_url": "https:\/\/github.com\/geniuszlyy",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2022-44149",
        "description": "it is script designed to interact with a router by sending a payload to its system tools. The script retrieves the router's configuration from environment variables to ensure security. It includes functions for generating an authorization header, sending a payload, and logging the process.",
        "fork": false,
        "created_at": "2024-08-09T19:27:22Z",
        "updated_at": "2024-10-06T16:41:28Z",
        "pushed_at": "2024-08-09T19:28:51Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve",
            "cve-2022-44149",
            "cybersecurity",
            "ethical-hacking",
            "exploit",
            "exploit-development",
            "linux",
            "payload",
            "penetration-testing",
            "poc",
            "privilege-escalation",
            "security",
            "vulnerability",
            "vulnerability-research"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 5,
        "score": 0,
        "subscribers_count": 1
    }
]