{"payload":{"header_redesign_enabled":false,"results":[{"id":"281334440","archived":false,"color":"#012456","followers":153,"has_funding_file":false,"hl_name":"math1as/CVE-2020-1337-exploit","hl_trunc_description":"CVE-2020-1337 Windows Print Spooler Privilege Escalation","language":"PowerShell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":281334440,"name":"CVE-2020-1337-exploit","owner_id":13290978,"owner_login":"math1as","updated_at":"2023-12-15T02:24:29.638Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":78,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amath1as%252FCVE-2020-1337-exploit%2B%2Blanguage%253APowerShell","metadata":null,"csrf_tokens":{"/math1as/CVE-2020-1337-exploit/star":{"post":"pqwEKjCMpy1EfLuekTMLL90MPxSKzEcwUTi-DBhqPbgUFv1_FK8CX4FzLsebC6VkI-uG_MYPawTttnm8tJ1_wg"},"/math1as/CVE-2020-1337-exploit/unstar":{"post":"hud-pv7WRukdJpSjADP80hoYbbPCqRJMZBIT2PutEzKxteg8GsIAdQPMN2qdN13LHW3Pfsdik2m3dsbl0TmT9A"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"f-g8WIOoheNKUcRqPZlNljKxHqPhm7Z7Ce_n39F6vQteTYDJMfE8HSux3h8WLct1HSDhZPnqwoKG-2ioWb_vqA"}}},"title":"Repository search results"}