[
    {
        "id": 871074826,
        "name": "cve-2024-23113",
        "full_name": "OxLmahdi\/cve-2024-23113",
        "owner": {
            "login": "OxLmahdi",
            "id": 159675795,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/159675795?v=4",
            "html_url": "https:\/\/github.com\/OxLmahdi",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/OxLmahdi\/cve-2024-23113",
        "description": null,
        "fork": false,
        "created_at": "2024-10-11T08:13:10Z",
        "updated_at": "2024-10-11T08:33:58Z",
        "pushed_at": "2024-10-11T08:33:54Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 871254396,
        "name": "CVE-2024-23113",
        "full_name": "CheckCve2\/CVE-2024-23113",
        "owner": {
            "login": "CheckCve2",
            "id": 184666422,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184666422?v=4",
            "html_url": "https:\/\/github.com\/CheckCve2",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/CheckCve2\/CVE-2024-23113",
        "description": "test_private_CVE",
        "fork": false,
        "created_at": "2024-10-11T15:16:00Z",
        "updated_at": "2024-10-11T15:49:21Z",
        "pushed_at": "2024-10-11T15:49:17Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 876057743,
        "name": "CVE-2024-23113",
        "full_name": "p33d\/CVE-2024-23113",
        "owner": {
            "login": "p33d",
            "id": 123099747,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123099747?v=4",
            "html_url": "https:\/\/github.com\/p33d",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/p33d\/CVE-2024-23113",
        "description": null,
        "fork": false,
        "created_at": "2024-10-21T10:27:52Z",
        "updated_at": "2024-12-19T14:51:10Z",
        "pushed_at": "2024-10-27T17:49:33Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 5,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 881252874,
        "name": "CVE-2024-23113",
        "full_name": "puckiestyle\/CVE-2024-23113",
        "owner": {
            "login": "puckiestyle",
            "id": 57447087,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
            "html_url": "https:\/\/github.com\/puckiestyle",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/puckiestyle\/CVE-2024-23113",
        "description": null,
        "fork": false,
        "created_at": "2024-10-31T07:44:06Z",
        "updated_at": "2024-10-31T07:46:06Z",
        "pushed_at": "2024-10-31T07:46:02Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 889028391,
        "name": "CVE-2024-23113",
        "full_name": "expl0itsecurity\/CVE-2024-23113",
        "owner": {
            "login": "expl0itsecurity",
            "id": 185355311,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355311?v=4",
            "html_url": "https:\/\/github.com\/expl0itsecurity",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/expl0itsecurity\/CVE-2024-23113",
        "description": null,
        "fork": false,
        "created_at": "2024-11-15T13:23:19Z",
        "updated_at": "2024-12-14T20:30:28Z",
        "pushed_at": "2024-11-15T13:25:50Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 892373700,
        "name": "cve-2024-23113-exp",
        "full_name": "XiaomingX\/cve-2024-23113-exp",
        "owner": {
            "login": "XiaomingX",
            "id": 5387930,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
            "html_url": "https:\/\/github.com\/XiaomingX",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-exp",
        "description": "CVE-2024-23113 是一个严重的安全漏洞,影响 Fortinet 的多款产品,包括 FortiOS、FortiProxy、FortiPAM 和 FortiSwitchManager。该漏洞允许未经身份验证的远程攻击者通过特制的请求,在受影响的设备上执行任意代码或命令,可能导致系统被完全控制。",
        "fork": false,
        "created_at": "2024-11-22T01:46:58Z",
        "updated_at": "2024-12-08T18:37:40Z",
        "pushed_at": "2024-11-22T01:53:45Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve",
            "exp",
            "poc",
            "rce"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 895404057,
        "name": "cve-2024-23113-poc",
        "full_name": "XiaomingX\/cve-2024-23113-poc",
        "owner": {
            "login": "XiaomingX",
            "id": 5387930,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
            "html_url": "https:\/\/github.com\/XiaomingX",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-poc",
        "description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。",
        "fork": false,
        "created_at": "2024-11-28T06:30:02Z",
        "updated_at": "2024-12-08T18:32:09Z",
        "pushed_at": "2024-11-28T06:35:22Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    }
]