2024-11-28 19:31:51 +01:00
[
{
"id" : 581073273 ,
"name" : "CVE-2023-50164" ,
"full_name" : "minhbao15677\/CVE-2023-50164" ,
"owner" : {
"login" : "minhbao15677" ,
"id" : 29054035 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29054035?v=4" ,
"html_url" : "https:\/\/github.com\/minhbao15677" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/minhbao15677\/CVE-2023-50164" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-12-22T07:49:13Z" ,
"updated_at" : "2024-04-26T02:52:45Z" ,
"pushed_at" : "2024-04-26T02:52:42Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 731065261 ,
"name" : "CVE-2023-50164-Apache-Struts-RCE" ,
"full_name" : "jakabakos\/CVE-2023-50164-Apache-Struts-RCE" ,
"owner" : {
"login" : "jakabakos" ,
"id" : 42498816 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4" ,
"html_url" : "https:\/\/github.com\/jakabakos" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/jakabakos\/CVE-2023-50164-Apache-Struts-RCE" ,
"description" : "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE)." ,
"fork" : false ,
"created_at" : "2023-12-13T09:31:36Z" ,
"updated_at" : "2024-11-27T21:19:08Z" ,
"pushed_at" : "2024-08-30T06:37:53Z" ,
"stargazers_count" : 81 ,
"watchers_count" : 81 ,
"has_discussions" : false ,
2024-12-07 13:31:43 +01:00
"forks_count" : 22 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-07 13:31:43 +01:00
"forks" : 22 ,
2024-11-28 19:31:51 +01:00
"watchers" : 81 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 732181811 ,
"name" : "CVE-2023-50164" ,
"full_name" : "bcdannyboy\/CVE-2023-50164" ,
"owner" : {
"login" : "bcdannyboy" ,
"id" : 12553297 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4" ,
"html_url" : "https:\/\/github.com\/bcdannyboy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164" ,
"description" : "A scanning utility and PoC for CVE-2023-50164" ,
"fork" : false ,
"created_at" : "2023-12-15T21:19:51Z" ,
"updated_at" : "2024-06-05T13:33:18Z" ,
"pushed_at" : "2023-12-15T23:50:17Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 4 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 732688819 ,
"name" : "cve-2023-50164-poc" ,
"full_name" : "dwisiswant0\/cve-2023-50164-poc" ,
"owner" : {
"login" : "dwisiswant0" ,
"id" : 25837540 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4" ,
"html_url" : "https:\/\/github.com\/dwisiswant0" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/dwisiswant0\/cve-2023-50164-poc" ,
"description" : "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")" ,
"fork" : false ,
"created_at" : "2023-12-17T14:18:54Z" ,
"updated_at" : "2024-11-16T19:50:08Z" ,
"pushed_at" : "2023-12-18T02:46:21Z" ,
"stargazers_count" : 59 ,
"watchers_count" : 59 ,
"has_discussions" : true ,
"forks_count" : 16 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 16 ,
"watchers" : 59 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
{
"id" : 732950140 ,
"name" : "cve-2023-50164" ,
"full_name" : "helsecert\/cve-2023-50164" ,
"owner" : {
"login" : "helsecert" ,
"id" : 2202200 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2202200?v=4" ,
"html_url" : "https:\/\/github.com\/helsecert" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/helsecert\/cve-2023-50164" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-18T08:24:26Z" ,
"updated_at" : "2024-01-13T09:38:24Z" ,
"pushed_at" : "2023-12-18T13:29:47Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 733837034 ,
"name" : "CVE-2023-50164-Apache-Struts-RCE" ,
"full_name" : "Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE" ,
"owner" : {
"login" : "Thirukrishnan" ,
"id" : 63901950 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63901950?v=4" ,
"html_url" : "https:\/\/github.com\/Thirukrishnan" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Thirukrishnan\/CVE-2023-50164-Apache-Struts-RCE" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-20T08:39:54Z" ,
"updated_at" : "2024-01-23T11:26:28Z" ,
"pushed_at" : "2023-12-20T09:51:45Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 733839177 ,
"name" : "CVE-2023-50164-ApacheStruts2-Docker" ,
"full_name" : "Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker" ,
"owner" : {
"login" : "Trackflaw" ,
"id" : 78696986 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4" ,
"html_url" : "https:\/\/github.com\/Trackflaw" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Trackflaw\/CVE-2023-50164-ApacheStruts2-Docker" ,
"description" : "Vulnerable docker container for Apache Struts 2 RCE CVE-2023-50164" ,
"fork" : false ,
"created_at" : "2023-12-20T08:46:19Z" ,
"updated_at" : "2024-05-14T07:52:52Z" ,
"pushed_at" : "2023-12-20T12:57:28Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"has_discussions" : false ,
2024-12-17 19:33:22 +01:00
"forks_count" : 3 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-17 19:33:22 +01:00
"forks" : 3 ,
2024-11-28 19:31:51 +01:00
"watchers" : 5 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 734560456 ,
"name" : "cve-2023-50164" ,
"full_name" : "miles3719\/cve-2023-50164" ,
"owner" : {
"login" : "miles3719" ,
"id" : 104630628 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104630628?v=4" ,
"html_url" : "https:\/\/github.com\/miles3719" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/miles3719\/cve-2023-50164" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-22T02:15:36Z" ,
"updated_at" : "2023-12-22T02:15:36Z" ,
"pushed_at" : "2023-12-22T02:15:36Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 734561364 ,
"name" : "cve-2023-50164" ,
"full_name" : "aaronm-sysdig\/cve-2023-50164" ,
"owner" : {
"login" : "aaronm-sysdig" ,
"id" : 132866139 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4" ,
"html_url" : "https:\/\/github.com\/aaronm-sysdig" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/aaronm-sysdig\/cve-2023-50164" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-22T02:20:11Z" ,
"updated_at" : "2024-01-13T09:38:29Z" ,
"pushed_at" : "2024-01-01T03:25:58Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 737392401 ,
"name" : "CVE-2023-50164-POC" ,
"full_name" : "snyk-labs\/CVE-2023-50164-POC" ,
"owner" : {
"login" : "snyk-labs" ,
"id" : 47793611 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47793611?v=4" ,
"html_url" : "https:\/\/github.com\/snyk-labs" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/snyk-labs\/CVE-2023-50164-POC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-30T21:37:08Z" ,
2024-11-29 07:32:01 +01:00
"updated_at" : "2024-11-29T05:49:34Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-01-16T14:59:23Z" ,
2024-11-29 07:32:01 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-11-29 07:32:01 +01:00
"watchers" : 5 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 7
} ,
{
"id" : 742353008 ,
"name" : "CVE-2023-50164-PoC" ,
"full_name" : "sunnyvale-it\/CVE-2023-50164-PoC" ,
"owner" : {
"login" : "sunnyvale-it" ,
"id" : 44291039 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4" ,
"html_url" : "https:\/\/github.com\/sunnyvale-it" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sunnyvale-it\/CVE-2023-50164-PoC" ,
"description" : "CVE-2023-50164 (Apache Struts path traversal to RCE vulnerability) - Proof of Concept" ,
"fork" : false ,
"created_at" : "2024-01-12T09:34:57Z" ,
"updated_at" : "2024-01-25T20:19:52Z" ,
"pushed_at" : "2024-01-16T13:05:54Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 787494467 ,
"name" : "CVE-2023-50164Analysis-" ,
"full_name" : "AsfandAliMemon25\/CVE-2023-50164Analysis-" ,
"owner" : {
"login" : "AsfandAliMemon25" ,
"id" : 154571318 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/154571318?v=4" ,
"html_url" : "https:\/\/github.com\/AsfandAliMemon25" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/AsfandAliMemon25\/CVE-2023-50164Analysis-" ,
"description" : "CVE-2023-50164 An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue." ,
"fork" : false ,
"created_at" : "2024-04-16T16:20:04Z" ,
"updated_at" : "2024-04-24T12:11:57Z" ,
"pushed_at" : "2024-04-16T17:09:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"apache" ,
"dockerfile" ,
"exploit" ,
"vulnerability" ,
"webapplications"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 868505012 ,
"name" : "CVE-2023-50164-PoC" ,
"full_name" : "NikitaPark\/CVE-2023-50164-PoC" ,
"owner" : {
"login" : "NikitaPark" ,
"id" : 25609921 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25609921?v=4" ,
"html_url" : "https:\/\/github.com\/NikitaPark" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/NikitaPark\/CVE-2023-50164-PoC" ,
"description" : "CVE-2023-50164 PoC Application & Exploit script" ,
"fork" : false ,
"created_at" : "2024-10-06T14:58:26Z" ,
2024-12-17 07:32:16 +01:00
"updated_at" : "2024-12-17T06:08:14Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2024-10-09T11:18:48Z" ,
2024-12-17 07:32:16 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-12-17 07:32:16 +01:00
"watchers" : 1 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 891621160 ,
"name" : "CVE-2024-10924-Wordpress-Docker" ,
"full_name" : "Trackflaw\/CVE-2024-10924-Wordpress-Docker" ,
"owner" : {
"login" : "Trackflaw" ,
"id" : 78696986 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4" ,
"html_url" : "https:\/\/github.com\/Trackflaw" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Trackflaw\/CVE-2024-10924-Wordpress-Docker" ,
"description" : "Vulnerable docker container for Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass CVE-2023-50164" ,
"fork" : false ,
"created_at" : "2024-11-20T16:50:24Z" ,
"updated_at" : "2024-11-25T19:41:23Z" ,
"pushed_at" : "2024-11-22T09:28:08Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0 ,
"subscribers_count" : 1
}
]