[
    {
        "id": 881591080,
        "name": "CVE-2024-51567",
        "full_name": "ajayalf\/CVE-2024-51567",
        "owner": {
            "login": "ajayalf",
            "id": 49350537,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49350537?v=4",
            "html_url": "https:\/\/github.com\/ajayalf",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/ajayalf\/CVE-2024-51567",
        "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
        "fork": false,
        "created_at": "2024-10-31T21:55:57Z",
        "updated_at": "2024-12-11T09:00:00Z",
        "pushed_at": "2024-11-01T10:48:42Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2024-51567",
            "cyberpanel"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 3,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 884847468,
        "name": "CVE-2024-51567-RCE-EXPLOIT",
        "full_name": "thehash007\/CVE-2024-51567-RCE-EXPLOIT",
        "owner": {
            "login": "thehash007",
            "id": 108442682,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108442682?v=4",
            "html_url": "https:\/\/github.com\/thehash007",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/thehash007\/CVE-2024-51567-RCE-EXPLOIT",
        "description": "cbyerpanel rce exploit",
        "fork": false,
        "created_at": "2024-11-07T13:52:37Z",
        "updated_at": "2024-11-07T13:57:28Z",
        "pushed_at": "2024-11-07T13:57:25Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 894240840,
        "name": "cve-2024-51567-poc",
        "full_name": "XiaomingX\/cve-2024-51567-poc",
        "owner": {
            "login": "XiaomingX",
            "id": 5387930,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4",
            "html_url": "https:\/\/github.com\/XiaomingX",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-51567-poc",
        "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
        "fork": false,
        "created_at": "2024-11-26T02:18:24Z",
        "updated_at": "2024-12-08T18:32:12Z",
        "pushed_at": "2024-11-26T02:21:21Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 6,
        "score": 0,
        "subscribers_count": 1
    }
]