[{"id":1153172706,"node_id":"R_kgDORLwE4g","name":"CVE-2026-23723-POC","full_name":"Ch35h1r3c47/CVE-2026-23723-POC","private":false,"owner":{"login":"Ch35h1r3c47","id":221506194,"node_id":"U_kgDODTPqkg","avatar_url":"https://avatars.githubusercontent.com/u/221506194?v=4","url":"https://api.github.com/users/Ch35h1r3c47","html_url":"https://github.com/Ch35h1r3c47","type":"User","site_admin":false},"html_url":"https://github.com/Ch35h1r3c47/CVE-2026-23723-POC","description":"This is a lightweight Python helper script designed to automate the generation of sqlmap-compatible PoC files for the authenticated error-based SQL injection vulnerability in WeGIA (≤ 3.6.1), identified as GHSA-xfmp-2hf9-gfjp.","fork":false,"url":"https://api.github.com/repos/Ch35h1r3c47/CVE-2026-23723-POC","created_at":"2026-02-09T01:43:55Z","updated_at":"2026-02-09T02:48:04Z","pushed_at":"2026-02-09T02:13:29Z","stargazers_count":2,"watchers_count":2,"forks_count":1,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":1,"watchers":2,"default_branch":"main","score":1}]