[ { "id": 614407734, "name": "kyocera-cve-2022-1026", "full_name": "ac3lives\/kyocera-cve-2022-1026", "owner": { "login": "ac3lives", "id": 26721330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26721330?v=4", "html_url": "https:\/\/github.com\/ac3lives" }, "html_url": "https:\/\/github.com\/ac3lives\/kyocera-cve-2022-1026", "description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords", "fork": false, "created_at": "2023-03-15T14:23:41Z", "updated_at": "2024-03-06T13:19:17Z", "pushed_at": "2023-03-15T14:33:48Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 666781357, "name": "nmap-printer-nse-scripts", "full_name": "flamebarke\/nmap-printer-nse-scripts", "owner": { "login": "flamebarke", "id": 39644720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39644720?v=4", "html_url": "https:\/\/github.com\/flamebarke" }, "html_url": "https:\/\/github.com\/flamebarke\/nmap-printer-nse-scripts", "description": "NSE port of CVE-2022-1026 exploit for mass identification and exploitation", "fork": false, "created_at": "2023-07-15T14:56:55Z", "updated_at": "2024-04-11T01:51:49Z", "pushed_at": "2023-07-15T14:59:06Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]