PoC-in-GitHub/2022/CVE-2022-1026.json
2023-12-21 21:36:13 +09:00

62 lines
No EOL
2.2 KiB
JSON

[
{
"id": 614407734,
"name": "kyocera-cve-2022-1026",
"full_name": "ac3lives\/kyocera-cve-2022-1026",
"owner": {
"login": "ac3lives",
"id": 26721330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26721330?v=4",
"html_url": "https:\/\/github.com\/ac3lives"
},
"html_url": "https:\/\/github.com\/ac3lives\/kyocera-cve-2022-1026",
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
"fork": false,
"created_at": "2023-03-15T14:23:41Z",
"updated_at": "2023-12-10T14:44:59Z",
"pushed_at": "2023-03-15T14:33:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 666781357,
"name": "nmap-printer-nse-scripts",
"full_name": "flamebarke\/nmap-printer-nse-scripts",
"owner": {
"login": "flamebarke",
"id": 39644720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39644720?v=4",
"html_url": "https:\/\/github.com\/flamebarke"
},
"html_url": "https:\/\/github.com\/flamebarke\/nmap-printer-nse-scripts",
"description": "NSE port of CVE-2022-1026 exploit for mass identification and exploitation",
"fork": false,
"created_at": "2023-07-15T14:56:55Z",
"updated_at": "2023-12-21T11:15:44Z",
"pushed_at": "2023-07-15T14:59:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]