[ { "id": 176290079, "name": "CVE-2019-0193", "full_name": "xConsoIe\/CVE-2019-0193", "owner": { "login": "xConsoIe", "id": 48456709, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48456709?v=4", "html_url": "https:\/\/github.com\/xConsoIe" }, "html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193", "description": null, "fork": false, "created_at": "2019-03-18T13:18:01Z", "updated_at": "2020-11-29T10:18:07Z", "pushed_at": "2019-03-18T13:22:48Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 8, "score": 0 }, { "id": 201405406, "name": "CVE-2019-0193", "full_name": "jas502n\/CVE-2019-0193", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-0193", "description": "Apache Solr DataImport Handler RCE", "fork": false, "created_at": "2019-08-09T06:27:39Z", "updated_at": "2022-08-29T00:33:42Z", "pushed_at": "2019-08-12T02:23:38Z", "stargazers_count": 88, "watchers_count": 88, "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 52, "watchers": 88, "score": 0 }, { "id": 201878363, "name": "solr_exploit", "full_name": "1135\/solr_exploit", "owner": { "login": "1135", "id": 19515911, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19515911?v=4", "html_url": "https:\/\/github.com\/1135" }, "html_url": "https:\/\/github.com\/1135\/solr_exploit", "description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit", "fork": false, "created_at": "2019-08-12T07:17:21Z", "updated_at": "2022-08-16T11:58:46Z", "pushed_at": "2020-07-08T06:51:47Z", "stargazers_count": 63, "watchers_count": 63, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 63, "score": 0 }, { "id": 206173868, "name": "CVE-2019-0193-exp", "full_name": "jaychouzzk\/CVE-2019-0193-exp", "owner": { "login": "jaychouzzk", "id": 45549315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45549315?v=4", "html_url": "https:\/\/github.com\/jaychouzzk" }, "html_url": "https:\/\/github.com\/jaychouzzk\/CVE-2019-0193-exp", "description": null, "fork": false, "created_at": "2019-09-03T21:16:24Z", "updated_at": "2020-09-06T01:31:02Z", "pushed_at": "2019-09-04T15:40:41Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 536020981, "name": "ApacheSolrRCE", "full_name": "jdr2021\/ApacheSolrRCE", "owner": { "login": "jdr2021", "id": 49977485, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49977485?v=4", "html_url": "https:\/\/github.com\/jdr2021" }, "html_url": "https:\/\/github.com\/jdr2021\/ApacheSolrRCE", "description": "ApacheSolrRCE(CVE-2019-0193)一键写shell,原理是通过代码执行的java文件流写的马。", "fork": false, "created_at": "2022-09-13T08:02:20Z", "updated_at": "2022-09-16T02:12:30Z", "pushed_at": "2022-09-13T17:15:00Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 13, "score": 0 } ]