[ { "id": 193926769, "name": "CVE-2019-0604", "full_name": "k8gege\/CVE-2019-0604", "owner": { "login": "k8gege", "id": 42312878, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4", "html_url": "https:\/\/github.com\/k8gege" }, "html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0604", "description": "cve-2019-0604 SharePoint RCE exploit", "fork": false, "created_at": "2019-06-26T15:00:29Z", "updated_at": "2020-09-05T17:01:23Z", "pushed_at": "2019-10-18T14:49:10Z", "stargazers_count": 84, "watchers_count": 84, "forks_count": 62, "forks": 62, "watchers": 84, "score": 0 }, { "id": 208650796, "name": "CVE-2019-0604", "full_name": "m5050\/CVE-2019-0604", "owner": { "login": "m5050", "id": 18764171, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/18764171?v=4", "html_url": "https:\/\/github.com\/m5050" }, "html_url": "https:\/\/github.com\/m5050\/CVE-2019-0604", "description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP", "fork": false, "created_at": "2019-09-15T20:06:54Z", "updated_at": "2020-06-25T02:16:52Z", "pushed_at": "2019-09-17T19:40:29Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 227013447, "name": "CVE-2019-0604", "full_name": "boxhg\/CVE-2019-0604", "owner": { "login": "boxhg", "id": 40994449, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40994449?v=4", "html_url": "https:\/\/github.com\/boxhg" }, "html_url": "https:\/\/github.com\/boxhg\/CVE-2019-0604", "description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload", "fork": false, "created_at": "2019-12-10T02:39:57Z", "updated_at": "2020-09-01T08:38:35Z", "pushed_at": "2019-12-11T09:33:31Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 4, "forks": 4, "watchers": 20, "score": 0 } ]